CISSP Domains: 2015 Update - Infosec

Transcription

CISSP Domains: 2015 UpdateAuthor: Kurt EllzeyBio: Kurt Ellzey currently works as a Global IT Administrator with Genthem. Kurthas worked in IT for the past 12 years, with a specialization in InformationSecurity. During this time, he has covered a broad swath of IT tasks from systemadministration to application development and beyond.DOMAIN ONE: SECURITY RISK AND MANAGEMENT3DOMAIN TWO: ASSET SECURITY7DOMAIN THREE: SECURITY ENGINEERING11DOMAIN FOUR: COMMUNICATIONS AND NETWORK SECURITY14DOMAIN FIVE: IDENTITY AND ACCESS MANAGEMENT18DOMAIN SIX: SECURITY ASSESSMENT AND TESTING21DOMAIN SEVEN: SECURITY OPERATIONS24DOMAIN EIGHT: SOFTWARE DEVELOPMENT SECURITY28

Domain One: Security Risk and ManagementThe CISSP 2015 Update brings new viewpoints on the key domains covered in thiscertification. The CISSP is already one of the broadest of all certs in that the amount ofinformation it covers in different fields is staggering. However, breaking this down intoits component domains or fields can help to chop at it bit by bit. With the new updates,each domain is a bit more streamlined –a bit easier to manage in the overall picture –and becomes easier to understand.We will be diving into each domain to see what you need to know if you have juststarted studying for the CISSP. Right off the bat we can say that with very fewexceptions the old domains are gone. That's not to say the information isn't thereanymore, its just that the perspectives on that information have shifted. The CISSPcertification has always been a managerial-level certification –understanding is requiredfor a lot of topics across a wide range of requirements. With the new update, it zeroesin on that concept: making it easier to look at things from particular scenarios with abird's eye view.With that in mind, let's take a look at our first domain: Security and RiskManagement: Security, Risk Compliance, Law, Regulations, Business Continuity.(Boy, that's a mouthful.)

As is usual for the CISSP, there is an awful lot of information to cover –and although afull study guide is beyond the scope of this document, it is easier to see where they aregoing with this domain. Five domains contribute to Security and Risk Management, alldealing with different aspects of risk and bringing them together into a single high levelpoint.Security Architecture and DesignRisk is a fundamental concept for security –you can throw money at something tomake it go away, but only so far until the costs outweigh the potentialbenefits. Knowing that breaking point is a critical requirement for organizations, andhaving an informed decision is vital. To that end, knowing what the company valuesmost regarding its information can help more easily draw conclusions on where to focusresources such as staff and funding. While all information needs to be kept safe to acertain degree, knowing what information needs to be kept under lock and key versuswhat can be put behind a friends-only filter on Facebook is a huge distinction.Legal Regulations, Investigations and Compliance

In the Global Reality that is the information age, knowing the specifics that you have todeal with if you choose to do business in a particular country can drastically changewhat level of funding is available for projects. Not only that, it can completely alterwhere and what information is stored, depending on laws and regulations that need tobe followed in order to stay on the law's good side. Despite the fact that some of theseitems can be fudged on papers (quite a lot of them actually), it is very important tohave strong ethical requirements to keep honest users and admins. Without theseguiding principles, it can be very easy to not only end up on the wrong side of the law,but behind bars as well with very heavy fines. Is there risk involved in doing businessin countries with strong information retention requirements? Absolutely. Is it worth it tothe organization to take on those responsibilities? That's a much bigger question.Information Security Governance and Risk ManagementRisk is not a static entity. It is fluid, ever changing and evolving. That being said, atthe organizational level, risk needs to be quantified in order to plan for it. NaturalDisasters, Information Accidents, Annoyed Former Employees, the list for potential riskscan seem to go on forever sometimes. Yet a proper assessment can give values tothese risks – how LIKELY is it that there is going to be an earthquake in the city in thenext 20 years? How LIKELY is it that there is going to be a very annoyed andmotivated ex-user that wants to make their employer pay? Being able to gauge theserisks and put in place not only major insurance policies, but also passive protections canmake a huge difference. For example, would the company benefit from getting adedicated security department? Or would it be more cost effective to hire an outsidecontractor to be site security? Would that open more potential problems than it wouldsolve?Business ContinuityJust like we mentioned in the previous section, major events can happen. But thatdoes not mean that everybody just runs around screaming after the fact. Known Risksmeans that they can be planned for ahead of time, and plans mean contingencies andreserved resources. Does the organization require a fully-staffed backup facility at alltimes? Or do they just need a set of backup tapes off-site? Is there a proper chain-ofcommand? Are there plans in place for situations where the weather is catastrophicallybad? The Risks around Business Continuity can be big-numbers, but they must beaddressed for the good of all involved.Access ControlAllowing Access to a facility, whether in the physical or information realms, is a riskybusiness. You need to know that only authorized users are walking your halls, accessing

your data and not just handing it over to your competitors. Being able to planaccordingly for potential threats to your people and your resources is not only arequirement for the good of the organization, but also for the health of your employees.The organization needs to be a safe place, or else no work would ever be done. Oncethese factors are accounted for, the employees must be able to be held accountable forbreaches in these situations. Did somebody just open a door for someone who forgottheir access token? Did another person just login for somebody else because theyforgot their password? These events can cause dire consequences if not handledproperly, which is why proper training for users is vital. There is an old saying that "Nobattle plan survives first contact with the enemy." The other side of that coin is "Nosecurity plan survives without user assistance." Without people understanding exactlywhy they have to jump through hoops to access the building's vending machine outsidethe secured area, they have no reason to respect those policies or requirements.Risk Management is a vital component of security, but one that may often times beoverlooked. Do you have to have a guard? Well sure, that's just what organizationsdo. Why? How many guards do you need? Where are the weak points inmonitoring? How difficult would it be for someone to gain access unnoticed? Howmuch would it be worth to the underpaid cleaning staff to take the night off and lendsomebody their access codes? What's the going rate for Security Cards and cloninggear right now on eBay? How much trouble would the organization be in if the localauthorities came in to investigate a breach in security? These are all things that needto be taken into consideration when trying to manage Risk, along with a hundred moreconcerns.

Domain Two: Asset SecurityEffective PermissionsPermissions are absolutely essential in the information age. Not every user needs to beable to read, edit or delete every document in an organization, so reducing theirpermissions so that they have only what they need to do their job is a first levelrequirement. In large organizations however, this becomes problematic if you aretrying to manage users one by one. One of the easiest ways to manage large numbers

of users simultaneously therefore is to use Groups instead. This allows an admin toadjust the permissions on many users at once, without needing to adjust themindividually. However, this also means that if a user is assigned to groups with varyinglevels of permissions on the same object, they may have more access than wasintended. Checking the Effective Permissions of users can tell exactly what they areallowed to do, and allow the admin to make adjustments as needed –perhaps to morethan just the user being examined.Data ClassificationNot every user needs to be able to access every file. In order to have a scale to go byin this situation, data needs to be classified on a number of variables: Whatdepartment does this belong to? Does this contain PII? Does it have any confidentialinformation in it? Is this information for CXO eyes only? Could it hurt the organizationor worse if it is released to the public? In this way, the responsibilities tied to particularusers can be assigned accordingly to allow them to perform their duties as well as limitpotential threats to the organization either by accidental or malicious causes.Additionally, it allows for specific instructions to be given to users regarding particularcases. For example. it gets tiring to users if they need to protect all information at themaximum level. However, if they know to treat particular information as special andthen the rest at a different level, it becomes easier and less stressful overall. The easierit is for the user, the more likely they are to follow instructions and procedures.File Permission Terminology and ConceptsWhile the implementation of file permissions can have thousands of differentcombinations, the actual ideas behind what a user can do with a particular file ordirectory come down to three distinct concepts: (r)ead, (w)rite and e(x)ecute. Readallows the user to see that the file exists, and if it is a non-executable file, to openit. Write allows the user to create files, and depending on the operating system allowsfor the modification of existing files. Execute allows the user to run programs orscripts.While it seems like these are additive permissions (and in many cases they are) –a userbeing required to have read permissions before they are allowed to write to a file –itisn't always the case. For example: I ran into an issue when I was taking onlineclasses where we were required to submit our papers to a particular directory. We hadWrite access to this directory, but not Read access. What that means was that we wereable to drag and drop our submissions into this folder, but not able to see what wasactually in that directory. As a rule, certain permission classes such as 'Deny' arefrowned upon because they can cause a lot of potential problems.

Access Control MethodologiesThere are a handful of models when it comes to the way that permissions work, andthe structures for those differ in a handful of key ways. A full description of how thesework can be found on another article at The InfoSec Institute located here. The stylethat most people will run into on a regular basis is based off of Role Based AccessControl: If you start working at an organization with a particular title, there will be adefault set of permissions associated with that particular title. Many timesadministrators will be given an existing person as an example and told "Give themeverything this person has". While that can be great for a start, if the example has hadtheir permissions modified to allow access to areas that they specifically need access to–not everybody with that title, for instance –then that can cause potential issues withgranting permissions beyond what that new hire needs to perform their duties.Administer Permissions in Various EnvironmentsNot every system is able to use the same kinds of permissions. While it would be greatto use Active Directory permissions across the board, not every system ties into adomain structure. If you are using a Linux box for a file server, you need to understandthat type of structure. If you only want certain people to be allowed to use USBdevices in your environment, you need to understand how to make that happen. If youwant particular people to be able to VPN into your network from outside, you will needto be able to understand how that would be done.Permissions cover a wide variety of issues in an organization, and despite being veryfamiliar with a particular set of permissions, it is always possible that you may need toadapt to a new setup quickly. Understanding the core concepts behind permissions ingeneral allows recognize where you can use the same styles of administration, andnecessarily need to re-invent the wheel.Prepare for Permission Escalation-Type AttacksPermission Escalation can take two different forms: Being granted permissionsnormally assigned to different or higher level users, or being granted permissionsnormally associated with a different level of the operating system. For example: If amalicious user broke into your environment with a set of compromised credentials, theywould first have the permissions of that particular user. If they were able to thencompromise another user of the same department, they could potentially gain access tomore data. However, if they move to either the manager of that department, or toanother user in a different department, they would gain access to a huge amount ofnew information, and so on. On the other hand, if when they broke into theenvironment using that compromised user's credentials they decided that they wantedto move from a standard user to an admin-level user, they would need to use exploits

on the system or on the network to gain that access. There are a lot of different waysto accomplish both these tasks, so having your users trained to guard their credentialsand use best practices on your privileged accounts is strongly encouraged.Protecting Data at RestData at rest is stored data –whether on a hard disk, tape, optical media, or otherstorage device. Protecting this can take many forms: encryption, safes, lockedcabinets, the list goes on and on. Knowing what is available for particular options, andhow that will impact the performance when users try to access that data is critical tochoosing the best option for your environment.Protecting Data in TransitData in Transit is data going across the wire, whether that is via a web server, email,instant messaging, etc. Replacing legacy protocols such as FTP with newer strongerprotocols can go a long way to helping to secure data in transit, but not always. Theuse of an encrypted point to point connection such as VPN can help protect data fromprying eyes, but again the exact method used will vary depending on yourrequirements.Protecting Assets is the reason why security exists in the first place: whether guardinga file cabinet or a person, it is security's job to make sure that no harm comes to whatis being protected. How much security is needed to protect a specific target? What arethe most likely attacks to come after that target? Who might know where those attacksare coming from? Is there a new exploit that we need to be on guard against? Arethere any annoyed users that may be susceptible to being bought? Are there higherranking officials that are set in their ways and do not feel the need to protectthemselves or their credentials? These are all things that need to be taken intoconsideration when trying to manage assets, along with a hundred more concerns.

Domain Three: Security EngineeringSoftware Development SecurityWhen custom programs and solutions are being developed, there are a lot of potentialproblem areas: Is the IDE secure? Are there any problems in the language that couldbe exploited easily? Are there holes in the code put there by a previous programmer?Was the program developed to separate hard-coded credentials from the standardprogram?

When developing code that will be used by a large group–whether consumers,companies or other organizations –it is important to be able to not only create securecode but that it is proven as such. Therefore, early on in the design cycle, it isimportant to know what weaknesses have been encountered before by past auditors sothat history does not repeat itself. Not only will this create a more secure product, butit will reduce time to market –resulting in happier end users.CryptographyCryptography is an excellent tool, but only when it is implementedeffectively. Headlines have been made consistently over the past several yearsregarding solutions that either were not implemented according to best practices, waysthat were discovered to get around roadblocks, or just that the protections were bruteforced into obsolescence. Knowing the requirements of your solution or objective willhelp to know what you need to be certain is working correctly: Do you need to secureinformation from prying eyes at all costs? Do you need to be certain that data is notmodified in transit? Or is it enough to be able to prove that the data was sent from aparticular source?It is also important to know your responsibilities to your users that you are not puttinga hole into their environment. It's one thing to provide a solution to a problem they arehaving, but introducing a new attack vector along with it is an entirely different matter.Physical (Environmental Security)Did you know that balls and pillars in front of shops are there for security and safetyreasons more often than for styling? Did you also know that just introducing grass andshrubs can help redirect foot traffic to a predictable trail? What would be moreeffective in your environment: patrolling guards, or a fleet of cameras and facialrecognition?Knowing where people are going to be, and using passive methods to reduce securityrequirements, can help a great deal – regardless if you are on a budget or not.Reducing entry points to a single point of contact can help drastically improve youroverall standing, but even if there is only one way in on the ground floor there areusually other ways in when there are issues with HVAC systems. In controlledenvironments, predictable heating and cooling are as vital and electricity and water.While it might be silly to think about, the larger or older the building you are in, themore likely you are to run into a 'Die Hard' scenario: someone able to infiltrate thebuilding and use the HVAC system as a way to get around undetected.Security Architecture & Design

Just because you are building a system from scratch doesn't mean you have to reinventthe entire idea of security. There are dozens of well known, tried and tested securitymodels that can be reviewed and adjusted as needed based on your requirements. Thetricky part is being able to see what is more effective before you spend a small fortuneon implementing a solution, only to find out that it doesn't scale well and you need tofind a new option. Once you have your solution stable and in place, it is important tobe able to test it regularly – finding out where your weak spots are, seeing what kindsof countermeasures need to be put in place to eliminate threats, and train your securityofficers –whether information security or physical security –to be ready to handle theproblems that will come up.Security Engineering is about more than just crafting a secure environment. It's aboutthe entire idea of security permeating everything that the organization does –from dayto day operations, to project management and auditing, to controlling thethermostat. The basic cycle of Idea, Design, Implement, Maintain covers nearly everyproject you could ever run into, and as with all projects that involve Engineering, theearlier a problem is identified and fixed, the less it is going to cost the organization.Spend the time needed to brainstorm options. Find out what different vendors have tooffer when you are looking at home built versus market standard grade products.Discover if it would be more efficient to bring in a third party to help set up when youare going live with a project. Finally, conduct a review as to whether or not it wouldmake sense if you are going with a premade solution if it would reduce costs to bite thebullet up front with most costs, rather than a more expensive maintenance contract. Orperhaps your people could be trained to deal with every issue they could come across ina particular situation –that is what this domain is all about: finding out what is best forthe organization, in a given environment, with a specified budget.

Domain Four: Communications and Network SecurityAlmost more than any other domain in the update, this domain lines up very well withits predecessor –the two cover the same basic footprint, however the new domaincovers newer technologies and methodologies than the previous one.Network Infrastructure ConceptsBefore someone can try to secure a network, they need to understand the basics ofwhat makes a network function. Without being able to wrap your head around thetheory of how a document would go from halfway around the world to your

workstation, it would be very difficult to be able to secure the path that it takes to getfrom point to point.OSI and TCP/IP ModelsImages provided by Wikipedia

The OSI model is considered by many to be the cornerstone on which all networkingand user interaction theory sits.It is a type of framework that is relatively easy tounderstand, and it's possible to classify most elements to a particular primarylayer. The problem with this structure is that in reality, it's ignored most of thetime. The model that most directly lines up with what is actually used on a day to daybasis is the TCP/IP Model. The models themselves are very similar, both in terminologyand functionality, but critically the TCP/IP model does not directly address the physicalhardware that the OSI model addresses.Hardening Network HardwareTo many, the difficult part in building a network is getting everything to talk to eachother and function correctly. From the security point of view however, this is justgetting started. Most devices still ship in a configuration that allows for widest possibleusage, which from a setup point of view is great, but not as far as security goes. The'secure by default' idea has been progressing well – many consumer-grade accesspoints that are provided by ISPs for instance now come with WPA2 enabled and arandomized password.Secure Communications ChannelsIt's no secret that there are a lot of ways that we communicate on a daily basis that canbe tracked. There are situations however where this is not only dangerous, but cancause tremendous problems for the organization –whether through locating userlocations, or disseminating information that is gleaned from the conversation. Thismeans that secure communications must be enabled and configured correctly, andinsecure methods need to be blocked. For example, say that your company only wantsusers to use their in-house developed instant messenger client. To enforce this, otherclients would then need to be blocked, so that users don't revert back to using softwarethat they may be more comfortable with.Network Attacks and Mitigation"Know your enemy and know yourself, find naught in fear for 100 battles. Knowyourself but not your enemy, find level of loss and victory. Know thy enemy but notyourself, wallow in defeat every time." Cyberattacks are coming more often than ever,and it is extremely important to know your organization's defenses and weakpoints, aswell as what attacks and vectors are used in your local area and business type. Beingable to detect attacks, deal with them, and having staff trained to manage all sides ofthe situation is incredibly important, as well as knowing what the new attacks are thatseem to be coming on a daily basis now.

Endpoint SecurityThe 'Endpoint' –the level at which primary defenses need to be active – keepsmoving. Being able to have strong security on individual nodes –regardless of whetherthat is a workstation, a mobile or a server –is more important than ever. Making surethat your solutions work together in a cohesive mesh rather than fight against eachother is absolutely vital, or else you could see a situation where you're having todeliberately break your security just to try to get things to talk to each other. I'm notsaying that this doesn't happen, and in some cases it is required, but it should be anabsolute last resort –something that happens no more than once in a blue moon.Remote AccessThe Mobile Office has been here for quite some time, and as a result, trying to create asolid wall to protect the network becomes difficult. Holes need to be drilled through thebarrier, to allow services and devices to connect reliably from both individual users aswell as other corporate locations and partners. This means being able to create secureconnections regardless of whether the person is at their desk or at their vacation housein Wyoming. There are many different methods of remote access, and if the ITdepartment does not create a secure option for this, users may find their own optionsand open up an unknown threat into the network.Network Access Control DevicesNetwork Access Control is a friend of the admin –something that can help keep visitorsfrom just plugging into any port they can find and going to town on thenetwork.Sticky ports, dedicated appliances, VPN's, single sign-on, proxy servers, thelist of options available to help secure connections is huge. The nice part about thesemethods is that most are capable of working together with each other, so that you donot necessarily need to trust only one method. Do you want to keep ports locked atuser desks but open in a conference room? Add in Single-Sign on as well.Users don'tlike jumping through hoops, but if you create something that is mostly invisible andadds functionality rather than putting roadblocks in their path, they are going to wantto use it.

Domain Five: Identity and Access ManagementControlsThere are three basic categories of software that help to control what users can do withaccess: Preventive, Detective and Corrective. Preventive blocks users from performingcertain actions, and is implemented through methods such as DRM. Detective Controlspick up on actions going on either on individual systems or across the network and actaccordingly. An example of this type of control would be something like a NetworkIntrusion Detection System. Corrective controls are the fail-safe software, such as yourautomatic backups, that help restore order when things go wrong.

Access Control TechniquesThere are a number of different types of access control, and each of them uses aslightly different style of controlling the way that users gain access to data.Discretionary Access Control –where users have access to grant each other permissiondirectly, such as in an ad-hoc network.Mandatory Access Control – where every user is granted permissions specifically from acentral source.Role Based Access Control – where users are given roles and assigned to groups, thengranted permissions according to their job functions.Vulnerability analysisAccess Control only works when users can't just get around it, or more appropriately, itis easier to use the authorized method than it is the unauthorized one. In order to keepthis balance in order, it is necessary to perform a vulnerability analysis to check wherethe weak spots in your authentication style are. Do you regularly grant users morepermissions than they need to complete their task? Is there a known exploit in theversion of Kerberos that your Operations System uses? Can users just boot up a liveLinux distro and bypass the authentication entirely?Threat ModelingWhen performing the vulnerability analysis, it will be necessary to take a look at whatyou are currently using to authenticate, and see what potential attack vectors cancome. This means knowing your environment and knowing what is out there, so youcan correctly profile what you are likely to come across. For example, if there is aknown issue in the neighborhood where false delivery people come in and steal fromnearby organizations, you would want to increase your user training on unauthorizedvisitors. Likewise, if there is a common attack against your business type right now, itwould be good to increase security against that type of situation.Provisioning LifecycleUsers, servers and software come and go. When this happens, you need to understandhow to grant and remove permissions as needed. For instance, when software thatconnects out to a 3rd party server is no longer needed, then the software needs to beuninstalled and its associated service account disabled so that that vector is no longeravailable to exploit. On the other hand, when a new user comes along, there needs to

be a specific process to request only the permissions they need, and have that listverified before access is granted.Access AggregationUsers gain new permissions, whether its on a per-project basis, moving fromdepartment to department, or a promotion. While not a bad thing in principle, thiscould potentially grant them more access than is intended. When in this type ofsituation, looking at the big picture is important. While being granted small permissionsin each group they are a member of doesn't seem like a big thing, they can add up veryquickly.Device and Facility SecurityA typical user's home is not left unlocked when they are not there to protect it, likewisewith a running vehicle or other important objects. With this in mind, it is vital to makethem understand that leaving a computer logged in, unlocked and unattended isdangerous in the same way that leaving the front door of the office with no one payingattention is dangerous. Anyone could come by and do all sorts of 'very bad things', andthe user would be t

The CISSP 2015 Update brings new viewpoints on the key domains covered in this certification. The CISSP is already one of the broadest of all certs in that the amount of information it covers in different fields is staggering. However, breaking this down into its component domains or fields